How receiver detects error, Computer Networking

Assignment Help:

How receiver detects error

The frame is 10011101. The generator is 1001. The message after appending the three zeros is 10011101000. The reminder on dividing 10011101000 by 1001 is 100. So, actual bit string transmitted is 10011101100. The arriving bit stream with an error in third bit from the left is 10111101100.Dividing this by 1001 produces remainder 100 that is different from zero. Therefore, the receiver detects error and can ask for a retransmission.

 


Related Discussions:- How receiver detects error

Bit stuffing, bit stuffing program in python

bit stuffing program in python

What is ring topology, What is Ring Topology? The physical ring topolog...

What is Ring Topology? The physical ring topology is a circular loop of point-to-point links. Every device connects directly to the ring or indirectly by and interface device o

Calculate bandwidth needed for voice traffic, The second point to consider ...

The second point to consider is that from each location, some calls are internal to that site and some are going to outside locations. Again, as an approximation, MyCo telecom peop

Coaxial Cable - computer network, Coaxial Cable Coaxial  cable  carrie...

Coaxial Cable Coaxial  cable  carries signals  of higher  frequency ranges than those in twisted pair cable. In part  because the two media are constructed quite  differently.

What is point to point link, What is point to point link? It refers to ...

What is point to point link? It refers to a direct connection among two computers on a network. A point to point connection does not require any other network devices other tha

Networks classification - point to point network , Normal 0 fal...

Normal 0 false false false EN-IN X-NONE X-NONE Networks classification

What is difference among flsm and vlsm, In FLSM subnet mask of all subnets ...

In FLSM subnet mask of all subnets will b same. But in FLSM it changes.

What are the threats include in computer software, What are the threats inc...

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd